2019
DOI: 10.1007/978-981-15-1922-2_1
|View full text |Cite
|
Sign up to set email alerts
|

Automatic Analysis and Reasoning Based on Vulnerability Knowledge Graph

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 23 publications
(13 citation statements)
references
References 11 publications
0
13
0
Order By: Relevance
“…An original intention of KG-based methods is to excavate implicit relationships from more instances. By calculating the conditional probability of a pair of weaknesses belonging to the same product entity in a vulnerability KG, Qin et al mined hidden weakness chains of compromised products in a statistical way [19].…”
Section: Reasoning-based Security Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…An original intention of KG-based methods is to excavate implicit relationships from more instances. By calculating the conditional probability of a pair of weaknesses belonging to the same product entity in a vulnerability KG, Qin et al mined hidden weakness chains of compromised products in a statistical way [19].…”
Section: Reasoning-based Security Analysismentioning
confidence: 99%
“…Algorithm 1: Continued ( 16) remove the last elements from cur_p_rela and cur_p_ent (17) end if (18) for each entity adj_ent and relation adj_rela adjacent to cur_ent do (19) if adj_ent is not in cur_p_ent then (20) DFS_SIM (adj_rela, adj_ent, cur_p_rela, cur_p_ent, p_vec, cur_sim, cur_len, e t , max_p_len, q_r_vec, cri_p_set) (21) end if (22) end for (23) remove the last elements from cur_p_rela and cur_p_ent (24) end function…”
Section: Algorithm 1: Critical Relation Path Depth-first Search With ...mentioning
confidence: 99%
“…The inference engine perceives and separates the abnormalities based on the instances repository and the user-defined inference rules to achieve the goal of automatically responding to threats. We analyzed the characteristics of multiple knowledge bases of IoT security, and we proposed an IoT Security Threat Ontology (IoTSTO), which was inspired by UCO [12], IoTSec [19], and VulKG [43]. Furthermore, some concepts were extracted from these works, but with many details adjusted to make the ontology more suitable for knowledge bases.…”
Section: Ontology-based Multi-source Knowledge Reasoning Framework For Iot Securitymentioning
confidence: 99%
“…Campaign can be expressed by the tactics, techniques, resources (tools, malware), groups that issued the malicious activities, and the mitigations that defend the system against this campaign. We analyzed the characteristics of multiple knowledge bases of IoT security, and we proposed an IoT Security Threat Ontology (IoTSTO), which was inspired by UCO [12], IoTSec [19], and VulKG [43]. Furthermore, some concepts were extracted from these works, but with many details adjusted to make the ontology more suitable for knowledge bases.…”
Section: Classes and Attributes Analysis Of Iotstomentioning
confidence: 99%
See 1 more Smart Citation